security and cooperation in wireless networks laboratory for communications and applications1
DESCRIPTION
Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1 Mini Project Final Presentation. Private Information Exposure in Online Social Networks with iOS , Android and Symbian Mobile Devices. Vassilis Agrafiotis – Communication Systems MA3. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/1.jpg)
PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES
Security and Cooperation in Wireless NetworksLaboratory For Communications and Applications1Mini Project Final PresentationSupervisors: Igor Bilogrevic
Mathias Humbert
Vassilis Agrafiotis – Communication
Systems MA3
1/17
![Page 2: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/2.jpg)
Roadmap
Motivation and Introduction Set Up Methodology Results
Privacy Risk Scale Results Summary
Conclusion and Improvements
2
![Page 3: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/3.jpg)
Motivation
To which extent is Privacy respected within Online Social Networks (OSN) ?
Study by looking for Private information disclosure in mobile OSNs
For some mobile platforms, different social networks require unnecessary personal – private information in order to perform an action.
Simulation and traffic analysis project
3
![Page 4: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/4.jpg)
Introduction
Selection of OSNs to investigate according to their popularity
4
![Page 5: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/5.jpg)
Introduction
Mobile Platforms studied:iOS, Android, Symbian
Access OSN and record traffic from mobile web browser mobile Application if available
5
![Page 6: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/6.jpg)
Set Up6
![Page 7: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/7.jpg)
Set Up7
![Page 8: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/8.jpg)
Methodology
Fake accounts for every OSN created
Set of possible actions defined within each OSN
Manually simulated execution for every OSN
Network traffic captured using WireShark
8
![Page 9: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/9.jpg)
Methodology
Traffic traces analyzed using a Java parser
Specific format information ex. email Coordinate like decimals
Further analysis with manual inspection of traces
9
![Page 10: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/10.jpg)
Methodology
A lot of traces were encrypted In this case, we collected also traffic by
accessing the OSNs through a PC for comparison
During the sniffing stage, we recorded the usage of GPS by noticing the GPS flash indication on the Smartphone
10
![Page 11: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/11.jpg)
Privacy Risk Scale11
![Page 12: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/12.jpg)
Results
In overall no major privacy violation discovered
Most of the traffic was encrypted Thus unable to accurately determine traffic
content Threat: what information is actually sent?
Type of information exchanged between SmartPhone and OSN are platform indepedent
12
![Page 13: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/13.jpg)
13
![Page 14: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/14.jpg)
Results 14
![Page 15: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/15.jpg)
Results15
![Page 16: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/16.jpg)
Results16
![Page 17: Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1](https://reader036.vdocument.in/reader036/viewer/2022062518/56814706550346895db43f8d/html5/thumbnails/17.jpg)
Conclusion and Improvements Popular OSNs are taking privacy seriously, but
still place to improveEncrypted traffic may be a 2-headed feature
Extend our study to others OSNs
Use emulator to simulate the execution and the usage of OSNs
TEMA project for Android platform
Record system calls in order to have more evidence about the type of information sent to OSNs servers
17